Software and network security
Handshaking: This is the process in which when a computer tries to establish a connection with another computer or device defines the rules for communication. Handshaking makes it possible for two computers or devices to connect without the need of human intervention to set parameters or rules of communication. Handshaking is the steps or verifying the connection, speed or authorization of the computer or device trying to connect to it.
Diskless networks: This is where the computer at the workstation doesn’t have any form of data storage and depends on another computer such as a server to load its operating system and to access data over a network connection. This is useful as it is easy to transfer data from a computer to a mobile storage device and removes the vulnerability of PC’s in the workstation. This can also be done over the ‘cloud’ using applications that emulate the behaviour of your computer system.
Use of backups: This is where data is copied to another storage device to ensure the data is safe and secure should system failures occur. These can help organizations recover from such failures and disasters immediately. There are several types of backups such as, incremental which stores only changed data since the last backup and differential which stores data that changed from the last full backup.